Pilot Event Bus

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent Pilot Protocol pub/sub helper, but it intentionally lets agents publish events, subscribe to topics, and establish trust with other agents, so host, topic, and trust choices matter.

This skill appears safe for its stated purpose if you already trust Pilot Protocol, pilotctl, and the participating agents. Before using it, verify hostnames, approve any new trust handshakes, avoid broad wildcard topics for important actions, and keep sensitive data out of event payloads unless all subscribers are trusted.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

An agent using this skill can issue event-bus commands that other trusted agents may act on.

Why it was flagged

The skill grants Bash use to run pilotctl pub/sub commands. This is central to the stated purpose, but incorrect host, topic, or payload choices could affect coordinated workflows.

Skill content
allowed-tools: - Bash ... pilotctl --json publish <target-hostname> <topic> --data <payload>
Recommendation

Keep Bash usage scoped to the documented pilotctl commands and review target hostnames, topics, and payloads before high-impact publishes.

#
ASI03: Identity and Privilege Abuse
Medium
What this means

Trusting the wrong hostname could allow an unintended agent to receive or send coordination events.

Why it was flagged

The skill includes trust-listing and trust-establishment operations. This is purpose-aligned for multi-agent coordination, but it changes which agents can participate.

Skill content
All participating agents must have mutual trust established ... pilotctl --json handshake <hostname> "reason for trust request"
Recommendation

Require explicit user approval before new handshakes, verify host identities, and periodically review the trusted-agent list.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

The safety of the workflow depends on the installed pilotctl binary and daemon being trustworthy.

Why it was flagged

The core behavior depends on external Pilot Protocol components that are not included or scanned in this instruction-only artifact.

Skill content
Requires pilot-protocol skill and pilotctl binary on PATH. The daemon must be running (pilotctl daemon start).
Recommendation

Install pilotctl and the Pilot Protocol skill from trusted sources and review those components separately.

#
ASI07: Insecure Inter-Agent Communication
Medium
What this means

Event payloads may be visible to or acted on by trusted subscribed agents.

Why it was flagged

The skill is designed to move event payloads between agents over a shared pub/sub channel. That is expected for the purpose, but it crosses agent and network boundaries.

Skill content
Multi-agent event aggregation using Pilot Protocol's built-in pub/sub on port 1002.
Recommendation

Only use this with mutually trusted agents, avoid unnecessary sensitive data in payloads, and scope topics narrowly.

#
ASI08: Cascading Failures
Medium
What this means

A mistaken or overly broad event could trigger multiple agents or workflows.

Why it was flagged

The documented fan-out and wildcard topic behavior can propagate one event to many agents. This is the intended event-bus function, but mistakes can cascade.

Skill content
broadcast events to all subscribed agents ... coordinate state changes across a fleet of agents ... Wildcards: tasks.*, alerts.error.*, *
Recommendation

Prefer specific topics over broad wildcards, use timeouts, and add human confirmation for events that could cause high-impact state changes.